汤战勇
时间:2024-05-11 17:33 来源: 作者: 点击:次
个人简介Personal Profile 汤战勇,西北大学教授,博士生导师,中国计算机学会高级会员,CCF系统软件专委会和CCF物联网专委会委员。陕西省中青年科技创新领军人才,软件安全与物联网智能感知陕西省高校工程研究中心主任,西北大学睡眠健康感知计算研究中心主任,陕西省秦创原物联网软件与系统安全“科学家+工程师”队伍首席科学家,物联网感知与安全“三秦学者”创新团队核心成员。曾在上海华为(2006-2007)、IBM(2007-2008)、绿盟科技NSFOCUS(2008-2014)任职,拥有⼋年的安全⾏业实际从业经验,其中在 NSFOCUS ⼯作期间,参与⼤量的⾏业安全风险评估服务,对于⼯业界漏洞检测、漏洞挖掘与修复、代码审计等业务有⼴泛的参与和深⼊理解。 目前主要围绕软件与系统安全、编译器与编程语言、智能计算与认证识别开展研究,主持各类国家重点研发计划、国基金面上、省部级重点以及校企联合创新课题二十余项,获得授权发明专利三十余项。相关成果在CCS、PLDI、NDSS、MOBICOM、INFOCOM、PACT、CC、UBICOMP、Sensys、ICDCS、PerCom和以及TIFS、TOPS、TON、Computers & Securtiy等一流会议和期刊上发表,曾获CCS'18和SenSys'19最佳论文提名。系列研究和发现得到了国际同行的评价和认可,被英国牛津大学系统安全实验室主任Ivan Martinovic 、美国伯克利大学教授、互联网安全教母Dawn Song和斯坦福大学应用加密和计算机安全教授Dan Boneh等多位网络和安全领域的ACM Fellow和IEEE Fellow在国际顶级会议上正面引用和评论。部分代表性研究进入世界一流大学计算机课堂(伊利诺伊大学机器学习系统与网络安全课程(CS598)、韩国科学技术院(KAIST)移动计算课程(CS442)、上海交通大学移动计算与感知课程(SJTU CS28014)),不仅被英国泰晤士报、美国福布斯、新华社等国内外主流媒介报道,而且在蚂蚁集团、华为2012实验室、腾讯等企业落地。获陕西省科学技术二等奖,陕西省高等学校科学技术一等奖,ACM China新星奖(西安)。 代表性研究成果: 1. [PLDI'21] Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing. Guixin Ye, Zhanyong Tang*(通信作者), Shin Hwei Tan, Dingyi Fang, Xiaoyang Sun, Lizhong Bian, Songfang Huang, Haibo Wang, Zheng Wang (CCF 推荐A类会议) 2. [PACT'20] Deep Program Structure Modeling Through Multi-Relational Graph-based Learning. Guixin Ye, Zhanyong Tang*(通信作者), Huanting Wang, Dingyi Fang, Jianbin Fang, Songfang Huang, Zheng Wang (CCF 推荐B类会议) 3. [INFOCOM'20] Camel: Smart, Adaptive Energy Optimization for Mobile Web Interactions. J Ren, L Yuan, P Nurmi, X Wang, M Ma, L Gao, Z Tang, J Zheng, Z Wang (CCF 推荐A类会议) 4. [ACM SenSys'19] Tagtag: material sensing with commodity RFID. B Xie, J Xiong, X Chen, E Chai, L Li, Z Tang, D Fang (CCF 推荐B类会议) 5. [ACM SenSys'19] WideSee: towards wide-area contactless wireless sensing. L Chen, J Xiong, X Chen, SI Lee, K Chen, D Han, D Fang, Z Tang, Z Wang (CCF 推荐B类会议) 6. [ICDCS'19] WiMi: Target Material Identification with Commodity Wi-Fi Devices. C Feng, J Xiong, L Chang, J Wang, X Chen, D Fang, Z Tang (CCF 推荐B类会议) 7. [ACM CCS'18] Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. Guixin Ye, Zhanyong Tang*(通信作者), Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang: (CCF 推荐A类会议) “ Best Paper Award Finalist ! ”(Top-4 ranked papers) 8. [MobiCom'18] CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing. Jie Zhang, Zhanyong Tang*(通信作者), Meng Li, Dingyi Fang, Petteri Nurmi, Zheng Wang: (CCF 推荐A类会议) 9. [UbiComp'18] SleepGuard: Capturing Rich Sleep Information Using Smartwatch Sensing Data. Liqiong Chang, Jiaqi Lu, Ju Wang, Xiaojiang Chen, Dingyi Fang, Zhanyong Tang, Petteri Nurmi, Zheng Wang: (CCF 推荐A类会议) 10. [UbiComp'18] RF-Copybook: A Millimeter Level Calligraphy Copybook based on commodity RFID,Liqiong Chang, Jie Xiong, Ju Wang, Xiaojiang Chen,Yu Wang, Zhanyong Tang, Dingyi Fang. (CCF 推荐A类会议) 11. [IJCAI'18] Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach. Pengfei Xu, Lei Wang, Ziyu Guan, Xia Zheng, Xiaojiang Chen, Zhanyong Tang, Dingyi Fang, Xiaoqing Gong, Zheng Wang: (CCF 推荐A类会议) 12. [PerCom'18] Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing. L. Chang, X. Li, J. Wang, H. Meng, X. Chen, D. Fang, Z. Tang, Z. Wang IEEE International Conference on Pervasive Computing and Communications (PerCom), 2018. (CCF 推荐B类会议) 13.[NDSS'17] Cracking Android Pattern Lock in Five Attempts G.X Ye, Z.Y Tang*(通信作者), D.Y Fang, X.J Chen, K.I Kim, B. Taylor, Z Wang. The Network and Distributed System Security Symposium 2017 (NDSS) (CCF 推荐B类会议,信息安全四大会议之一) 14. [ACM TOPS] A Video-based Attack for Android Pattern Lock.Guixin Ye, Zhanyong Tang*(通信作者), Dingyi Fang, Xiaojiang Chen, Willy Wolff, Adam Aviv, Zheng Wang. ACM Transactions on Privacy and Security (ACM TOPS) , 2018. (CCF 推荐B类期刊) 15. [ACM TOPS] Using Generative Adversarial Networks to Break and Protect Text Captchas. G Ye, Z Tang*(通信作者), D Fang, Z Zhu, Y Feng, P Xu, X Chen, J Han, Z Wang ACM Transactions on Privacy and Security (ACM TOPS) , 2020. (CCF 推荐B类期刊) 16. [Computers & Security] Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. Kaiyuan Kuang , Zhanyong Tang*(通信作者), Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Zheng Wang. Computers & Security 74 (2018) 202–220 (CCF 推荐B类期刊) 17. [Computers & Security] Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks. Jie Zhang, Zhanyong Tang*(通信作者), Li Meng, DingYi Fang, Xiaojiang Chen, Zheng Wang. Computers and Security , 2019. (CCF 推荐B类期刊) 18. [Computers & Security] Compile-time Code Virtualization for Android Applications. Y Zhao, Z Tang*(通信作者), G Ye, D Peng, D Fang, X Chen, Z Wang. Computers and Security , 2020. (CCF 推荐B类期刊) 19. [Computers & Security] Semantics-aware Obfuscation Scheme Prediction for Binary. Y Zhao, Z Tang*(通信作者), G Ye, D Peng, D Fang, X Chen, Z Wang. Computers and Security , 2020. (CCF 推荐B类期刊) 20. [IEEE TIIFS] Combining Graph-based Learning with Automated Data Collection for Code Vulnerability Detection. Wang, H., Ye, G., Z Tang*(通信作者), Tan, S. H., Huang, S., Fang, D., ... & Wang, Z. IEEE Transactions on Information Forensics and Security, 2020. (CCF 推荐A类期刊) |